Management User GovernmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Management User Government returned the following results.
RSS What is RSS?
Related Categories

 •   Identity Management/ User Provisioning
 •   Access Control
 •   Authentication / Password Management
 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Virtualization
 •   Treasury / Cash / Risk Management

Related Searches
 •   Call Management User Government
 •   Making Management User
 •   Management Calls
 •   Management Lists
 •   Management Washington
 •   National Management User
 •   Presentation Management User Government
 •   Reporting Management User
 •   Statement Management User
 •   Technical Management User
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

SAP Netweaver: Streamlining the Transition to Services-Based IT Security by SAP America, Inc.

June 2008 - (Free Research)
This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security. 
(WHITE PAPER) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

Implementing an identity management solution by SAP America, Inc.

June 2008 - (Free Research)
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory. 
(WHITE PAPER) READ ABSTRACT |

AGESIC (Uraguay) by IBM

June 2011 - (Free Research)
Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management. 
(CASE STUDY) READ ABSTRACT |

Building a Secure and Compliant Windows Desktop by BeyondTrust Corporation

May 2008 - (Free Research)
Removing administrator rights from end users when they log into their desktop is the Holy Grail of desktop security, but its implementation has been difficult. Read this white paper to discover the benefits of removing admin rights. 
(WHITE PAPER) READ ABSTRACT |

Access Control in Virtual Environments by FoxT

June 2008 - (Free Research)
The growth in use of virtual servers is heralded by many as a positive development because it is seen to save companies money and resources. 
(WHITE PAPER) READ ABSTRACT |

User Access Controls: Authorizations Insight for PeopleSoft by Approva Corporation

January 2007 - (Free Research)
Approva's Authorizations Insight for PeopleSoft monitors user authorizations across all your PeopleSoft ERP environments to detect, remediate and prevent segregation of duties (SoD) conflicts and inappropriate access to sensitive pages. 
(DATA SHEET) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

Develop Effective User Management to Demonstrate Compliance Efforts and Achieve Business Value by IBM

December 2008 - (Free Research)
Learn how IBM solutions can help organizations support compliance efforts and business requirements through user management solutions based on IBM Tivoli Identity Manager software and other IBM offerings. 
(WHITE PAPER) READ ABSTRACT |

Client Computing with Virtual User Environment by Intel Corporation

November 2008 - (Free Research)
Intel IT developed a new computing approach that combines multiple emerging technologies, including client virtualization and streaming, to potentially transform the way we deliver computing to users. 
(WHITE PAPER)

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile by Hewlett-Packard Company

November 2008 - (Free Research)
This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Eliminating Notes ID File Password Management: A Ground-breaking Alternative by PistolStar, Inc.

June 2008 - (Free Research)
Read this white paper to learn how to eliminate the hassles of Lotus Notes ID file password management by enabling access via Notes by authenticating it against LDAP. 
(WHITE PAPER) READ ABSTRACT |

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies by ArcSight, an HP Company

August 2010 - (Free Research)
The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(WHITE PAPER) READ ABSTRACT |

Directory Services Integration with Database Enterprise User Security by Oracle Corporation

April 2008 - (Free Research)
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment. 
(WHITE PAPER) READ ABSTRACT |

5 Keys to a Successful Identity and Access Management Implementation by CA Technologies.

December 2007 - (Free Research)
An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation. 
(WHITE PAPER) READ ABSTRACT |

QSA Tokenization Broker Assessors Guide by Intel

May 2011 - (Free Research)
Tokenization has become popular as a way of strengthening the security of credit card and e-commerce transactions while minimizing the cost and complexity of compliance. In this white paper, learn about a tokenization approach that can reduce compliance costs in both data center and private cloud environments. 
(WHITE PAPER) READ ABSTRACT |

The State of System i Security 2008 by PowerTech

August 2008 - (Free Research)
This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i. 
(WHITE PAPER) READ ABSTRACT |

7 Key Reasons to Implement an Identity Aware Network by Applied Identity

March 2008 - (Free Research)
This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets. 
(WHITE PAPER) READ ABSTRACT |

Developing an Enterprise Client Virtualization Strategy by Intel Corporation

November 2008 - (Free Research)
Intel conducted a series of studies to analyze the potential benefits of each technology and to begin to develop a targeted strategy for delivering client virtualization to our users. Read this document to review the findings. 
(WHITE PAPER)

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management by IBM

March 2009 - (Free Research)
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security. 
(DEMO) READ ABSTRACT |

The "Hard Truths" About Managing Administrative and Application Identities by Cyber-Ark Software

July 2008 - (Free Research)
This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy. 
(VIDEOCAST) READ ABSTRACT |

Effectively manage access to systems and information to help optimize integrity and facilitate compliance by IBM Software Group

January 2008 - (Free Research)
Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data. 
(WHITE PAPER) READ ABSTRACT |

Provide Access Control With Innovative Solutions From IBM by IBM

January 2011 - (Free Research)
Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts